The SCEAS System
Navigation Menu

Journals in DBLP

Int. J. Inf. Sec.
2005, volume: 4, number: 3

  1. Einar Snekkenes
    Preface to the special issue on ESORICS 2003. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:133-134 [Journal]
  2. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal]
  3. David von Oheimb, Volkmar Lotz, Georg Walter
    Analyzing SLE 88 memory management security using Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:155-171 [Journal]
  4. Andrei Serjantov, Peter Sewell
    Passive-attack analysis for connection-based anonymity systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:172-180 [Journal]
  5. David A. Basin, Sebastian Mödersheim, Luca Viganò
    OFMC: A symbolic model checker for security protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:181-208 [Journal]
  6. Jonathan T. Trostle, Bill Gossman
    Techniques for improving the security and manageability of IPsec policy. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:209-226 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002